You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
This open access book constitutes the proceedings of the 29th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2023, which was held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2023, during April 22-27, 2023, in Paris, France. The 56 full papers and 6 short tool demonstration papers presented in this volume were carefully reviewed and selected from 169 submissions. The proceedings also contain 1 invited talk in full paper length, 13 tool papers of the affiliated competition SV-Comp and 1 paper consisting of the competition report. TACAS is a forum for researchers, developers, and users interested in rigorously based tools and algorithms for the construction and analysis of systems. The conference aims to bridge the gaps between different communities with this common interest and to support them in their quest to improve the utility, reliability, flexibility, and efficiency of tools and algorithms for building computer-controlled systems.
This book constitutes the proceedings of the 13th International Conference on Information Security and Practice and Experience, ISPEC 2017, held in Melbourne, Australia, in December 2017. The 34 full and 14 short papers presented together with 9 papers from the SocialSec Track in this volume were carefully reviewed and selected from 105 submissions. The papers cover topics such as blockchain, asymmetric encryption, symmetric encryption, lattice-based cryptography, searchable encryption, signature, authentication, cloud security, network security, cyber-physical security, social network and QR code security, software security and trusted computing, and SocialSec track.
This two-volume set LNICST 396 and 397 constitutes the post-conference proceedings of the Third EAI International Conference on Artificial Intelligence for Communications and Networks, AICON 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 79 full papers were carefully reviewed and selected from 159 submissions. The papers are organized in topical sections on Artificial Intelligence in Wireless Communications and Satellite Communications; Artificial Intelligence in Electromagnetic Signal Processing; Artificial Intelligence Application in Wireless Caching and Computing; Artificial Intelligence Application in Computer Network.
This book constitutes the proceedings of the 12th International Conference on Network and System Security, NSS 2018, held in Hong Kong, China, in August 2018. The 26 revised full papers and 9 short papers presented in this book were carefully reviewed and selected from 88 initial submissions. The papers cover a wide range of topics in the field, including blockchain, mobile security, applied cryptography, authentication, biometrics, IoT, privacy, and education.
This book constitutes selected papers presented at the 16th International Conference on Service Science, ICSS 2023, held in Harbin, China, in May 2023. The 36 full papers and 2 short papers presented were thoroughly reviewed and selected from the 71 submissions. They are organized in the following topical sections: serverless edge computing; edge services reliability; intelligent services; service application; knowledge-inspired service; service ecosystem; graph-based service optimization; AI-inspired service optimization.
This book discusses understand cybersecurity management in decentralized finance (DeFi). It commences with introducing fundamentals of DeFi and cybersecurity to readers. It emphasizes on the importance of cybersecurity for decentralized finance by illustrating recent cyber breaches, attacks, and financial losses. The book delves into understanding cyber threats and adversaries who can exploit those threats. It advances with cybersecurity threat, vulnerability, and risk management in DeFi. The book helps readers understand cyber threat landscape comprising different threat categories for that can exploit different types of vulnerabilities identified in DeFi. It puts forward prominent threat m...
Blockchain technology is bringing together concepts and operations from several fields, including computing, communications networks, cryptography, and has broad implications and consequences thus encompassing a wide variety of domains and issues, including Network Science, computer science, economics, law, geography, etc. The aim of the paper is to provide a synthetic sketch of issues raised by the development of Blockchains and Cryptocurrencies, these issues are mainly presented through the link between on one hand the technological aspects, i.e. involved technologies and networks structures, and on the other hand the issues raised from applications to implications. We believe the link is a two-sided one. The goal is that it may contribute facilitating bridges between research areas.
Die Inhalte und Methoden, die chinesische Forscher im Feld der Wirtschaftswissenschaften bearbeiten und verwenden, sind trotz des intensivierten wissenschaftlichen Austauschs noch immer weitgehend unbekannt in Deutschland. Der Herausgeberband "Technology and Innovation Management: Theories, Methods and Practices from Germany and China" gibt einen aktuellen Einblick in die Themengebiete, mit denen sich chinesische Wissenschaftler im Bereich der Technologieforschung in China und Deutschland beschäftigen und stellen diesen die aktuellen Forschungsgegenstände namhafter Vertreter der Forschung in diesem Bereich aus Deutschland gegenüber. Es entsteht ein informatives Bild der wichtigsten Zielrichtungen und Projekte, mit denen sich die Wissenschaftler aus den beiden Ländern inhaltlich und methodisch beschäftigen.